- Joined
- Jan 5, 2006
- Messages
- 18,584 (2.70/day)
System Name | AlderLake |
---|---|
Processor | Intel i7 12700K P-Cores @ 5Ghz |
Motherboard | Gigabyte Z690 Aorus Master |
Cooling | Noctua NH-U12A 2 fans + Thermal Grizzly Kryonaut Extreme + 5 case fans |
Memory | 32GB DDR5 Corsair Dominator Platinum RGB 6000MT/s CL36 |
Video Card(s) | MSI RTX 2070 Super Gaming X Trio |
Storage | Samsung 980 Pro 1TB + 970 Evo 500GB + 850 Pro 512GB + 860 Evo 1TB x2 |
Display(s) | 23.8" Dell S2417DG 165Hz G-Sync 1440p |
Case | Be quiet! Silent Base 600 - Window |
Audio Device(s) | Panasonic SA-PMX94 / Realtek onboard + B&O speaker system / Harman Kardon Go + Play / Logitech G533 |
Power Supply | Seasonic Focus Plus Gold 750W |
Mouse | Logitech MX Anywhere 2 Laser wireless |
Keyboard | RAPOO E9270P Black 5GHz wireless |
Software | Windows 11 |
Benchmark Scores | Cinebench R23 (Single Core) 1936 @ stock Cinebench R23 (Multi Core) 23006 @ stock |
Hundreds of laptop models from different brands use an unsafe Secure Boot key.
As a result, it is possible to install UEFI malware such as bootkits or to disable Secure Boot completely on at least 900 devices from well-known brands such as Acer and Dell.
Researchers from Binarly draw this conclusion in a study they call PKfail.
Systems affected:
The researchers looked at an internal dataset with UEFI firmware images and scanned them for the use of the Platform Key in question.
According to them, there are more than 900 laptops and systems from Acer, Dell, Gigabyte, HP and Lenovo that are vulnerable to PKfail.
This makes it possible to completely bypass Secure Boot and install code on a system, such as a UEFI rootkit.
The researchers say that the affected devices use a Platform Key that is no longer secure. Such a Platform Key is a kind of master key for Secure Boot devices.
The researchers found a git repository online that contained that master key. That repo was updated in December 2022, but has since been taken offline.
It’s not known when that happened or who had access to it in the meantime, but the researchers say all devices using that master key are vulnerable.
The git repo itself was encrypted, but the password was only four characters long, making it relatively easy to crack.
In practice, this is quite a lot of work; an attacker still has to manipulate the Key Exchange Key, Signature and Forbidden Signature databases on a system.
The researchers have also released a proof-of-concept. This shows how the bug can be exploited on both a Windows and Ubuntu PC.
As a result, it is possible to install UEFI malware such as bootkits or to disable Secure Boot completely on at least 900 devices from well-known brands such as Acer and Dell.
Researchers from Binarly draw this conclusion in a study they call PKfail.
Systems affected:
SupplyChainAttacks/PKfail/ImpactedDevices.md at main · binarly-io/SupplyChainAttacks
Contribute to binarly-io/SupplyChainAttacks development by creating an account on GitHub.
github.com
The researchers looked at an internal dataset with UEFI firmware images and scanned them for the use of the Platform Key in question.
According to them, there are more than 900 laptops and systems from Acer, Dell, Gigabyte, HP and Lenovo that are vulnerable to PKfail.
This makes it possible to completely bypass Secure Boot and install code on a system, such as a UEFI rootkit.
The researchers say that the affected devices use a Platform Key that is no longer secure. Such a Platform Key is a kind of master key for Secure Boot devices.
The researchers found a git repository online that contained that master key. That repo was updated in December 2022, but has since been taken offline.
It’s not known when that happened or who had access to it in the meantime, but the researchers say all devices using that master key are vulnerable.
The git repo itself was encrypted, but the password was only four characters long, making it relatively easy to crack.
In practice, this is quite a lot of work; an attacker still has to manipulate the Key Exchange Key, Signature and Forbidden Signature databases on a system.
The researchers have also released a proof-of-concept. This shows how the bug can be exploited on both a Windows and Ubuntu PC.
Kwetsbaarheid door standaardkey maakt Secure Boot op honderden pc-typen onveilig
Honderden laptopmodellen van verschillende merken gebruiken een onveilige Secure Boot-key. Daardoor is het op minstens 900 modellen van bekende merken zoals Acer en Dell mogelijk om uefimalware zoals bootkits te plaatsen of Secure Boot volledig uit te schakelen.
tweakers.net
Last edited: